EP0280035A2 - Method for the programme securing and for integrity checking of a secured programme - Google Patents
Method for the programme securing and for integrity checking of a secured programme Download PDFInfo
- Publication number
- EP0280035A2 EP0280035A2 EP19880100810 EP88100810A EP0280035A2 EP 0280035 A2 EP0280035 A2 EP 0280035A2 EP 19880100810 EP19880100810 EP 19880100810 EP 88100810 A EP88100810 A EP 88100810A EP 0280035 A2 EP0280035 A2 EP 0280035A2
- Authority
- EP
- European Patent Office
- Prior art keywords
- programs
- check digit
- stored
- program
- encryption
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 30
- 230000015654 memory Effects 0.000 claims abstract description 21
- 238000012545 processing Methods 0.000 claims description 12
- 230000004913 activation Effects 0.000 claims description 3
- 230000008859 change Effects 0.000 claims description 3
- 239000000969 carrier Substances 0.000 claims 1
- 238000012360 testing method Methods 0.000 abstract description 31
- 230000008569 process Effects 0.000 abstract description 9
- 230000003213 activating effect Effects 0.000 abstract 1
- 230000000903 blocking effect Effects 0.000 abstract 1
- 238000013478 data encryption standard Methods 0.000 description 9
- 230000000694 effects Effects 0.000 description 4
- 230000006870 function Effects 0.000 description 4
- 238000004364 calculation method Methods 0.000 description 3
- 206010013710 Drug interaction Diseases 0.000 description 2
- 239000000919 ceramic Substances 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 238000007789 sealing Methods 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000015572 biosynthetic process Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000011234 economic evaluation Methods 0.000 description 1
- 230000001681 protective effect Effects 0.000 description 1
- 230000003936 working memory Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/08—Error detection or correction by redundancy in data representation, e.g. by using checking codes
- G06F11/10—Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's
- G06F11/1008—Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's in individual solid state devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/08—Error detection or correction by redundancy in data representation, e.g. by using checking codes
- G06F11/10—Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's
- G06F11/1076—Parity data used in redundant arrays of independent storages, e.g. in RAID systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/355—Personalisation of cards for use
- G06Q20/3552—Downloading or loading of personalisation data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/409—Device specific authentication in transaction processing
- G06Q20/4097—Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
- G06Q20/40975—Device specific authentication in transaction processing using mutual authentication between devices and transaction partners using encryption therefor
Definitions
- the invention relates to a method for securing the programs contained in the system memory of a data processing system against changes and for checking the integrity of programs that have been saved.
- the programs used for control and application that is to say the program system consisting of the operating system and application system, are stored in a system memory, which can be, for example, a magnetic disk.
- a system memory which can be, for example, a magnetic disk.
- the programs are loaded into a working memory and processed in order to control the work processes of the data processing system as part of the operating system and to perform data processing tasks specified by the user in the application system.
- Computer networks were developed with data processing systems in which individual computers communicate with each other.
- the largely automatic exchange of information must be secured against fraudulent manipulation, particularly in application areas such as banking, insurance, trade or administration.
- Such manipulations can also take place at program level and possibly lead to a computer executing unwanted additional, too few or changed commands, which can result in personal data being misused, processed and further processed be given, computer spending takes place for the benefit of an unauthorized person or other damage is inflicted on the user of the computer network or third parties.
- the invention is therefore based on the object of specifying a method by which it is possible in a data processing system without significantly impairing the System performance to automatically detect tampering with programs and automatically prevent manipulated programs from taking effect.
- the system carrier for the respective target computer can be sealed in the administration computer in this way, the check digits serving as a logical seal for all programs stored on the system carrier that are loadable and necessary for the execution of the application system.
- Encryption is performed using a symmetric cryptographic algorithm. As is known, this encryption principle offers a very high level of security against decryption.
- DES DATA Encryption Standard
- the decryption of an encrypted text works in exactly the reverse order of how the encryption of the plain text was carried out. Therefore, it is a symmetrical process.
- the high security of this algorithm is based on its mathematical properties, which lead to that the knowledge of the plain text and also the associated key text is not sufficient to determine the secret key with reasonable effort.
- the DES algorithm is not used to encrypt data, but rather to derive a checksum when encrypting programs.
- the read-protected storage of the key used for the encryption is known per se, and for this purpose a special security module can be provided with which every computer in the computer network is equipped.
- This security module can contain a memory in which the key used is stored in a physically inaccessible form.
- the security module can also contain further hardware functional units that can further increase the security effect achieved with the invention.
- the security achieved with it against the impact of unauthorized program manipulations can be further increased if the check digit of the first program that starts the system start-up, the so-called bootstrap program, is saved read-only.
- This additional measure prevents knowledge of the first check digit occurring in the control sequence and thus makes it impossible to attempt to use this check digit to possibly determine the secret key with which the bootstrap program was also encrypted.
- This is the first Checking process running as part of the integrity control is absolutely secure against unauthorized access and change.
- the following explains how the method according to the invention for backing up the programs in practical use with an administration computer and a target computer is carried out.
- the general rule here is that a system carrier that is executable for the commissioning of a target computer is provided with additional information in the form of the check digits.
- These check digits result from several encryption steps which are carried out using a secret key stored in a security module and to which the programs stored on the system carrier are subjected one after the other.
- the check digits are a logical seal for all programs stored on the system carrier of the target computer that are loadable and necessary for the execution of the application system.
- a check digit is generated for the start procedure, which is not stored in a legible form in the safety module.
- All other check digits can be stored in a freely accessible and readable manner on the system carrier, since the secret key is not accessible for the encryption steps.
- the security module of the target computer works in such a way that the key stored in it is only used to calculate a check digit while simultaneously comparing this check digit with a reference check digit supplied to the security module, so that the security module cannot output a check digit as a result, but only a yes No statement about whether the calculated check digit matches the reference check digit or not, ie in the target computer system, without knowledge of the secret key, no unauthorized PZ check digit calculation is possible.
- this system carrier can be used in the target computer will.
- the integrity check is automatically initiated within the system start-up procedure that is running before the application is started. This results in several test steps, whereby a respective test step is only initiated if its execution code has been verified as unchanged by the previous test step.
- the first test step is initiated by the bootstrap program and carried out in the safety module. This logic is therefore not physically freely accessible. If the bootstrap program is influenced or changed logically, such a change is detected during the first test step within the safety module and the safety module is deactivated so that it can no longer be used for the subsequent test steps and can therefore no longer be carried out.
- FIG. 1 shows how the system carrier and the security module of a target computer are subjected to the method according to the invention in the administration computer.
- the components of the management computer that are active as part of the backup procedure are shown schematically, while the passive components that have to be prepared for use in the target computer are shown on the right.
- Active components are an encryption program 11, with which the individual encryption steps to be carried out for the calculation of check digits are controlled, and an encryption module 12, which, controlled by the encryption program 11, supplies the individual programs to be secured, so that it provides one for each program Can give check digit.
- Passive components are a system carrier 15 with a check digit memory 14 and a plain text memory part 13 for saved programs and a security module 16 and a plain text memory 17 for a bootstrap program.
- the bootstrap program When preparing the passive components for use in the target computer, the bootstrap program is first output from the plain text memory 17, controlled by the encryption program 11, and the check digit to be assigned to the bootstrap program is calculated with the encryption module 12 using the secret key present in it. This is then output by the encryption module 12 and, under the control of the encryption program 11, supplied to the security module 16; With this step, the security key 16 is simultaneously given the secret key for read-protected storage.
- the check digits for the programs contained in the plain text storage part 13 of the system carrier 15 are then calculated and, controlled by the encryption program 11, stored in the check digit memory 14 of the system carrier 15. All encryption steps that are carried out in the encryption module 12 of the management computer are based on the secret key that is stored in the encryption module 12.
- test step is shown as part of a chain of test steps that can lie within the system start-up phase of the target computer. Active components are shown on the left side of a vertical dashed line, passive components of the target computer are shown on the right side.
- Each test step is carried out with a test program 21, which is referred to as a tester and which feeds the test objects, namely a program 23 to be tested and an associated check digit 24, to a security module 22 which, in the manner described, uses the secret key entered into it to calculate a check digit for each program fed to it and uses the compares the associated check digit 24 supplied to it.
- the safety module 22 transmits the comparison result, controlled by the checking program 21, in the form of a yes-no statement to the next checking entity, which is the program that has just been checked, provided that it is a yes statement. If the answer is no, a special function block is activated that can signal the error situation and, for example, interrupt the process of the system, trigger an error message or otherwise force a corrective action.
- start signal which is supplied to the checking program 21 and which can be the yes statement of the previous checking step or else the initial start signal for the system start.
- FIG. 3 shows how a sequence of test steps of the type explained above can be carried out in a target computer. It is a representation of the chronological sequence of these test steps, which is divided into three phases from top to bottom, namely a switch-on phase, a system start-up phase and an application phase.
- the active components are shown on the left, the passive components on the right by a vertical dashed line.
- the individual test steps are continuously labeled S0, S1, S2, S3 ... Sn.
- a test program is shown as the active component and a program to be tested as the passive component.
- the safety module not shown for the respective test step, since its function has already been explained with reference to FIG. 2.
- a start signal ST is given to the bootstrap program 31 in the test step S0, which is started thereby and initiates the test step S1, which is thus the first step of the system startup phase.
- the bootstrap loader program 31 is fed to the security module 35 as a program to be tested, and encryption is carried out there using the secret key stored therein to calculate a check digit, which is then compared with the check digit stored in it for the bootstrap loader program 31. If the two check digits match, the result is a yes statement with which the bootstrap program 31 is controlled for the test step S2, so that for this test step it becomes the active component with which the resident operating system 32 is tested.
- a no statement made by the safety module 35 is fed to a control program 36, which can interrupt the further system start-up in a manner not shown here.
- the resident operating system 32 is passed as a passive component with its individual program parts by the bootstrap program 31 to the security module (not shown for this test step S2), so that it can be subjected to encryption by which a check digit results.
- This check digit is compared with a check digit 34, which is simultaneously fed to the bootstrap program 31 or the security module connected to it. If the two check digits are identical, the result is a yes statement, which the resident operating system 32 controls and makes this the active component, which then causes the program parts from the load library 33 to be checked.
- This test step S3 is carried out like test step S2, so that at Correspondence between the check digit calculated in it and the check digit 34 associated with the program to be checked in each case yields a yes statement which is passed on to the control program 36, which can then start the operation of the application phase by means of a signal AW.
- test steps of the type described here can of course be carried out within the application phase, provided that the individual application programs have been provided with a check digit in the administration computer, which can be stored in a check digit memory or in the loading library.
- a program or test object P0 to be tested for which a check digit PZ (P0) is to be calculated, is supplied to a division program, specifying an address ADR and a length LAE, in order to divide the test object into individual blocks B. These blocks B have the same length and are each subjected to a DES encryption step with a secret starting value SW and key IK at least once.
- An encryption program 41 is used for this purpose.
- the result C which occurs when a respective block B is encrypted is fed to the encryption program 41 as a starting value for the next block to be encrypted.
- the encryption result of the last block B is designated CE and represents the generated check digit PZ (P0), which can then be assigned to a program or saved in a security module as a check digit for a bootstrap program.
- this generation of a check digit can be carried out with firmware or with software.
- FIG. 5 shows the execution of a check digit check in the target computer with a security module.
- the check digit control differs from the generation described with reference to FIG. 4 only in the input / output parameters and in a comparison process.
- An additional input parameter is a reference value RW, which serves as a comparison value after the calculation of the check digit PZ (P0).
- RW reference value
- PZ check digit PZ
- the method of check digit control requires corresponding encryption methods, start values and keys.
- a safety module 60 shows the basic structure of a safety module 60 as an exemplary embodiment. It can be a hardware module that can be connected to the target computer via a plug connection. Commands and data are exchanged between the target computer and the safety module via this connection.
- Essential components of the security module are a processor 61 and a security hybrid module 62.
- the processor 61 is used to control the individual functions of the security module 60, for example for command decoding, for connecting data lines and for placing orders with the security hybrid module 62.
- This is a module in the manner of an integrated circuit, the modular components of which are applied discretely and can be provided with a ceramic cover overall.
- the hybrid module contains a processor 63, a DES module 64 and two key memories 65 and 66 with random access.
- the processor 63 is used for control and execution of commands and data between the DES module 64 and the read-protected key memories 65 and 66. Furthermore, it controls the external data flow to the processor 61.
- the DES module 64 controls the execution of the encryption method described.
- the key memory 65 is used to hold keys with a length of, for example, 64 bits, which are available to the application for DES encryption; the key memory 66 contains keys that can only be used by the processor 63 for internal functions, but not by external application programs. Access to a data line within the safety hybrid module is prevented by the ceramic cover mentioned. If the connection of the security module 60 to the target computer is interrupted, the key memory 65 is thereby deleted. The contents of the key store 66 can be held by a battery. If the hybrid module 62 is removed from the safety module 60, this means that all stored values are lost. This ensures that it is not possible to use the security module 60 outside the computer area.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- General Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Health & Medical Sciences (AREA)
- Quality & Reliability (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Computer Networks & Wireless Communication (AREA)
- Software Systems (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Finance (AREA)
- Storage Device Security (AREA)
- Techniques For Improving Reliability Of Storages (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Selective Calling Equipment (AREA)
Abstract
Description
Die Erfindung betrifft ein Verfahren zum Sichern der in dem Systemspeicher einer Datenverarbeitungsanlage enthaltenen Programme gegen Änderung und zur Integritätskontrolle gesicherter Programme.The invention relates to a method for securing the programs contained in the system memory of a data processing system against changes and for checking the integrity of programs that have been saved.
In Datenverarbeitungsanlagen und mit ihnen aufgebauten Rechnersystemen sind die zur Steuerung und zur Anwendung dienenden Programme, also das aus Betriebssystem und Anwendungssystem bestehende Programmsystem, in einem Systemspeicher gespeichert, der beispielsweise eine Magnetplatte sein kann. Beim Betrieb einer Datenverarbeitungsanlage werden die Programme in einen Arbeitsspeicher geladen und abgearbeitet, um im Rahmen des Betriebssystems die Arbeitsabläufe der Datenverarbeitungsanlage zu steuern und im Rahmen des Anwendungssystems durch den Anwender vorgegebene Aufgaben der Datenverarbeitung zu lösen.In data processing systems and computer systems built with them, the programs used for control and application, that is to say the program system consisting of the operating system and application system, are stored in a system memory, which can be, for example, a magnetic disk. When a data processing system is in operation, the programs are loaded into a working memory and processed in order to control the work processes of the data processing system as part of the operating system and to perform data processing tasks specified by the user in the application system.
Mit Datenverarbeitungsanlagen wurden Rechnernetze entwickelt, in denen einzelne Rechner miteinander kommunizieren. Der dabei weitgehend automatisch ablaufende Informationsaustausch muß insbesondere in Anwendungsbereichen wie Bankwesen, Versicherungswesen, Handel oder Verwaltung gegen betrügerische Manipulation gesichert werden. Derartige Manipulationen können auch auf Programmebene erfolgen und möglicherweise dazu führen, daß ein Rechner unerwünschte zusätzliche, zu wenige oder veränderte Befehle ausführt, was die Folge haben kann, daß personenbezogene Daten mißbräuchlich ausgewertet, verarbeitet und weiter gegeben werden, Rechnerausgaben zum Vorteil eines Unberechtigten erfolgen oder anderweitiger Schaden dem Anwender des Rechnernetzes oder Dritten zugefügt wird.Computer networks were developed with data processing systems in which individual computers communicate with each other. The largely automatic exchange of information must be secured against fraudulent manipulation, particularly in application areas such as banking, insurance, trade or administration. Such manipulations can also take place at program level and possibly lead to a computer executing unwanted additional, too few or changed commands, which can result in personal data being misused, processed and further processed be given, computer spending takes place for the benefit of an unauthorized person or other damage is inflicted on the user of the computer network or third parties.
Da es für den Anwender eines Rechnernetzes sehr schwierig ist, manipulierte Programme zu erkennen und dann durch entsprechende Korrekturmaßnahmen Integrität zu gewährleisten, sollte es möglich sein, die Manipulation von Programmen automatisch zu erkennen und gleichfalls automatisch das Ausführen manipulierter Programme zu verhindern. Zur Sicherung von Programmen sind allerdings bisher nur Verfahren bekannt, die das nicht autorisierte Kopieren verhindern und hierzu Verschlüsselungen anwenden, die zum Ausführen solcher Programme spezielle Prozessoren erfordern. Solche Sicherungsmaßnahmen sollen die unberechtigte wirtschaftliche Auswertung und Weitergabe von Programmen verhindern, können aber nicht Manipulationen an Programmen in Rechnernetzen erkennen und Falschausführung von Programmen verhindern. Es ist auch möglich, eine Betriebsmittel- und Zugriffskontrolle durch Verwendung von Paßworten oder Benutzerkatalogen, eine Geheimhaltung von Daten oder physikalische Maßnahmen wie Autorisierung über spezielle Schalter oder Schlüssel vorzusehen, um einen gewissen Schutz gegen unberechtigte Manipulationen zu erreichen. Diese Möglichkeiten sind aber vergleichsweise wertlos, wenn ein Programmierer oder vergleichbar qualifiziertes Personal Zugriff zum Rechnernetz hat. Dann ist es aufgrund der besonderen Fachkenntnisse möglich, Programme trotz Schutzmaßnahmen vorstehend genannter Art zu manipulieren.Since it is very difficult for the user of a computer network to recognize manipulated programs and then to ensure integrity through appropriate corrective measures, it should be possible to automatically detect the manipulation of programs and also to automatically prevent manipulated programs from being executed. To secure programs, however, only methods are known so far that prevent unauthorized copying and use encryption for this purpose, which require special processors to execute such programs. Such security measures are intended to prevent the unauthorized economic evaluation and distribution of programs, but cannot detect tampering with programs in computer networks and prevent programs from being executed incorrectly. It is also possible to provide resource and access control by using passwords or user catalogs, confidentiality of data or physical measures such as authorization via special switches or keys in order to achieve a certain protection against unauthorized manipulation. However, these possibilities are comparatively worthless if a programmer or comparable qualified personnel has access to the computer network. Then, due to the special expertise, it is possible to manipulate programs despite the protective measures mentioned above.
Der Erfindung liegt deshalb die Aufgabe zugrunde, ein Verfahren anzugeben, durch das es möglich ist, in einer Datenverarbeitungsanlage ohne wesentliche Beeinträchtigung der Systemleistung Manipulationen an Programmen automatisch zu erkennen und automatisch das Wirksamwerden manipulierter Programme zu verhindern.The invention is therefore based on the object of specifying a method by which it is possible in a data processing system without significantly impairing the System performance to automatically detect tampering with programs and automatically prevent manipulated programs from taking effect.
Diese Aufgabe löst die Erfindung für ein Verfahren eingangs genannter Art dadurch, daß mindestens die den Systemanlauf bewirkenden Programme jeweils nach einem symmetrischen kryptographischen Algorithmus unter Verwendung eines lesegeschützt gespeicherten geheimen Schlüssels zur Bildung einer Prüfziffer verschlüsselt werden, die in dem Systemspeicher gespeichert wird, und daß zur Integritätskontrolle mit dem Systemanlauf der Datenverarbeitungsanlage ein sukzessives nochmaliges derartiges Verschlüsseln der Programme und jeweils ein Vergleich der so erhaltenen Prüfziffer mit der zugehörigen gespeicherten Prüfziffer veranlaßt wird, so daß bei negativem Vergleichsergebnis das Aktivieren jeweils nachfolgender Systemanlaufschritte bzw. Programme sperrbar ist.This object is achieved by the invention for a method of the type mentioned above in that at least the programs which cause the system start-up are each encrypted according to a symmetrical cryptographic algorithm using a secret key which is stored in a read-protected manner to form a check digit which is stored in the system memory and for Integrity control with the system start-up of the data processing system initiates a successive repeated encoding of the programs and a comparison of the check digit thus obtained with the associated stored check digit, so that the activation of subsequent system startup steps or programs can be blocked in the event of a negative comparison result.
Durch die Erfindung wird erreicht, daß Manipulationen im gesamten Programmsystem einer Datenverarbeitungsanlage, also im Betriebssystem und im Anwendungssystem, automatisch erkannt werden und bereits im Systemanlauf bei Erkennen einer Manipulation sofort der Betrieb unterbrochen werden kann. Man erhält dadurch den Effekt einer "Versiegelung" der Programme bzw. einen versiegelten Systemspeicher oder Systemträger, was sich schon bei dem Systemstart der Datenverarbeitungsanlage auswirkt, da dann bereits die Integritätskontrolle erfolgen kann. Zur Sicherung der Programme wird der Systemspeicher mit zusätzlichen Informationen in Form von Prüfziffern versehen, die das Ergebnis von Verschlüsselungsschritten sind, welche unter Zugrundelegung eines geheimen Schlüssels durchgeführt werden. In einem Rechnernetz mit Verwaltungsrechner und mehreren Zielrechnern kann der Systemträger für den jeweiligen Zielrechner im Verwaltungsrechner in dieser Weise versiegelt werden, wobei die Prüfziffern als logisches Siegel für alle auf dem Systemträger gespeicherten Programme dienen können, die ladefähig und zum Ablauf des Anwendungssystems notwendig sind. Es sind dies die Programme für das während des Rechnerbetriebs speicherresidente Betriebssystem sowie alle Programme, die in Ladebibliotheken in ablauffähiger Form gespeichert sind. Da zu dieser Versiegelung ein geheimer Schlüssel verwendet wird, der lesegeschützt gespeichert ist, muß jede unberechtigte Manipulation an den Programmen bei der Integritätskontrolle im Zielrechner, bei der unter Verwendung desselben geheimen Schlüssels ein nochmaliges Verschlüsseln eines jeden Programms unter Bildung der Prüfziffer durchgeführt wird, bei dem gemäß der Erfindung durchzuführenden Vergleichsschritt zu einem Fehlersignal führen, denn die für das manipulierte Programm durchgeführte Verschlüsselung führt zu einer anderen Prüfziffer als sie für das nicht manipulierte Programm im Verwaltungsrechner erzeugt wurde. Das Fehlersignal kann dann zum automatischen Sperren der Aktivierung nachfolgender Programme benutzt werden.It is achieved by the invention that manipulations in the entire program system of a data processing system, that is to say in the operating system and in the application system, are automatically recognized and that operation can be interrupted immediately when a manipulation is detected when the system is started. This gives the effect of a "sealing" of the programs or a sealed system memory or system carrier, which has an effect when the data processing system is started, since the integrity check can then already take place. To secure the programs, the system memory is provided with additional information in the form of check digits which are the result of encryption steps which are carried out under On the basis of a secret key. In a computer network with an administration computer and several target computers, the system carrier for the respective target computer can be sealed in the administration computer in this way, the check digits serving as a logical seal for all programs stored on the system carrier that are loadable and necessary for the execution of the application system. These are the programs for the operating system that is memory-resident during computer operation as well as all programs that are stored in load libraries in executable form. Since a secret key is used for this sealing, which is stored in a read-protected manner, any unauthorized manipulation of the programs during the integrity check in the target computer, in which each program is re-encrypted using the same secret key to form the check digit, in which lead to an error signal to be carried out according to the invention, because the encryption performed for the manipulated program leads to a different check digit than was generated for the non-manipulated program in the management computer. The error signal can then be used to automatically block the activation of subsequent programs.
Das Verschlüsseln wird unter Verwendung eines symmetrischen kryptographischen Algorithmus durchgeführt. Dieses Verschlüsselungsprinzip bietet bekanntermaßen einen sehr hohen Sicherheitsgrad gegen Entschlüsselung. Die bekannteste Ausführungsform ist der DES-Algorithmus (DES = DATA Encryption Standard). Die Entschlüsselung eines verschlüsselten Textes läuft in genau umgekehrter Reihenfolge ab wie die Verschlüsselung des Klartextes durchgeführt wurde. Deshalb handelt es sich um ein symmetrisches Verfahren. Die hohe Sicherheit dieses Algorithmus beruht auf seinen mathematischen Eigenschaften, die dazu führen, daß die Kenntnis des Klartextes und auch des zugehörigen Schlüsseltextes nicht ausreicht, um mit vertretbarem Aufwand den geheimen Schlüssel zu ermitteln. Im Rahmen der Erfindung wird der DES-Algorithmus aber nicht zum Verschlüsseln von Daten, sondern zur Ableitung einer Prüfsumme bei der Verschlüsselung von Programmen eingesetzt.Encryption is performed using a symmetric cryptographic algorithm. As is known, this encryption principle offers a very high level of security against decryption. The best known embodiment is the DES algorithm (DES = DATA Encryption Standard). The decryption of an encrypted text works in exactly the reverse order of how the encryption of the plain text was carried out. Therefore, it is a symmetrical process. The high security of this algorithm is based on its mathematical properties, which lead to that the knowledge of the plain text and also the associated key text is not sufficient to determine the secret key with reasonable effort. In the context of the invention, however, the DES algorithm is not used to encrypt data, but rather to derive a checksum when encrypting programs.
Das lesegeschützte Speichern des für die Verschlüsselung verwendeten Schlüssels ist an sich bekannt, und hierzu kann ein besonderer Sicherheitsbaustein vorgesehen sein, mit dem jeder Rechner des Rechnernetzes ausgerüstet ist. Dieser Sicherheitsbaustein kann einen Speicher enthalten, in den der verwendete Schlüssel in physikalisch unzugänglicher Form eingespeichert ist. Wie noch gezeigt wird, kann der Sicherheitsbaustein auch weitere Hardware-Funktionseinheiten enthalten, die den mit der Erfindung erzielten Sicherheitseffekt weiter erhöhen können.The read-protected storage of the key used for the encryption is known per se, and for this purpose a special security module can be provided with which every computer in the computer network is equipped. This security module can contain a memory in which the key used is stored in a physically inaccessible form. As will be shown, the security module can also contain further hardware functional units that can further increase the security effect achieved with the invention.
Da das erfindungsgemäße Verfahren entsprechend dem Ablauf des Programmsystems in einer Kette aufeinander folgender Verschlüsselungsschritte bzw. Kontrollschritte durchgeführt wird, kann die mit ihm erreichte Sicherheit gegen die Auswirkung unberechtigter Programmanipulationen weiter erhöht werden, wenn die Prüfziffer des ersten, den Start des Systemanlaufs bewirkenden Programms, des sogenannten Urladerprogramms, lesegeschützt gespeichert wird. Diese zusätzliche Maßnahme verhindert die Kenntnis der ersten in der Kontrollsequenz auftretenden Prüfziffer und macht somit den Versuch unmöglich, unter Verwendung dieser Prüfziffer möglicherweise den geheimen Schlüssel zu ermitteln, mit dem auch die Verschlüsselung des Urladerprogramms durchgeführt wurde. Damit ist der erste im Rahmen der Integritätskontrolle ablaufende Prüfvorgang absolut sicher gegen unberechtigten Zugriff und Veränderung.Since the method according to the invention is carried out according to the sequence of the program system in a chain of successive encryption steps or control steps, the security achieved with it against the impact of unauthorized program manipulations can be further increased if the check digit of the first program that starts the system start-up, the so-called bootstrap program, is saved read-only. This additional measure prevents knowledge of the first check digit occurring in the control sequence and thus makes it impossible to attempt to use this check digit to possibly determine the secret key with which the bootstrap program was also encrypted. This is the first Checking process running as part of the integrity control is absolutely secure against unauthorized access and change.
Die Erfindung wird im folgenden an Hand der Figuren weiter erläutert. Es zeigen:
- Fig. 1 die gegenseitige Zuordnung und Wechselwirkung von Komponenten eines Verwaltungsrechners bei der Durchführung des Verfahrens,
- Fig. 2 die gegenseitige Zuordnung und Wechselwirkung der Komponenten eines Zielrechners bei der Durchführung des Verfahrens,
- Fig. 3 die Darstellung des Ablaufs sukzessiver Prüfschritte in einem Zielrechner,
- Fig. 4 den prinzipiellen Ablauf einer Verschlüsselung mit Prüfziffernbildung in einem Verschlüsselungsbaustein eines Verwaltungsrechners,
- Fig. 5 den prinzipiellen Ablauf einer Verschlüsselung und eines Prüfziffernvergleichs in einem Sicherheitsbaustein eines Zielrechners und
- Fig. 6 den grundsätzlichen Aufbau eines Sicherheitsbausteins.
- 1 shows the mutual assignment and interaction of components of an administrative computer when carrying out the method,
- 2 shows the mutual assignment and interaction of the components of a target computer when carrying out the method,
- 3 shows the sequence of successive test steps in a target computer,
- 4 shows the basic sequence of encryption with check digit formation in an encryption module of an administration computer,
- 5 shows the basic sequence of encryption and a check digit comparison in a security module of a target computer and
- Fig. 6 shows the basic structure of a safety module.
Im folgenden wird erläutert, wie das erfindungsgemäße Verfahren zum Sichern der Programme im praktischen Einsatz mit einem Verwaltungsrechner und einem Zielrechner durchgeführt wird. Allgemein gilt dabei, daß in dem Verwaltungsrechner ein für die Inbetriebnahme eines Zielrechners lauffähiger Systemträger mit zusätzlichen Informationen in Form der Prüfziffern versehen wird. Diese Prüfziffern ergeben sich aus mehreren Verschlüsselungsschritten, die unter Anwendung eines in einem Sicherheitsbaustein gespeicherten geheimen Schlüssels durchgeführt werden und denen die auf dem Systemträger gespeicherten Programme nacheinander unterzogen werden. Die Prüfziffern sind logisches Siegel für alle auf dem Systemträger des Zielrechners gespeicherten Programme, die ladefähig und zum Ablauf des Anwendungssystems notwendig sind. Zusätzlich wird dabei eine Prüfziffer für die Startprozedur erzeugt, die in dem Sicherheitsbaustein nicht lesbar gespeichert wird. Alle anderen Prüfziffern können frei zugänglich und lesbar auf dem Systemträger gespeichert werden, da der geheime Schlüssel für die Verschlüsselungsschritte nicht zugänglich ist. Der Sicherheitsbaustein des Zielrechners arbeitet derart, daß der in ihm gespeicherte Schlüssel nur zur Berechnung einer Prüfziffer bei gleichzeitigem Vergleich dieser Prüfziffer mit einer dem Sicherheitsbaustein zugeführten Referenz-Prüfziffer verwendet wird, so daß der Sicherheitsbaustein als Ergebnis keine Prüfziffer ausgeben kann, sondern lediglich eine Ja-NeinAussage darüber ausgibt, ob die berechnete Prüfziffer mit der Referenz-Prüfziffer übereinstimmt oder nicht, d.h. im Zielrechnersystem ist ohne Kenntnis des geheimen Schlüssels keine unberechtigte PZ-Prüfziffernberechnung möglich.The following explains how the method according to the invention for backing up the programs in practical use with an administration computer and a target computer is carried out. The general rule here is that a system carrier that is executable for the commissioning of a target computer is provided with additional information in the form of the check digits. These check digits result from several encryption steps which are carried out using a secret key stored in a security module and to which the programs stored on the system carrier are subjected one after the other. The check digits are a logical seal for all programs stored on the system carrier of the target computer that are loadable and necessary for the execution of the application system. In addition, a check digit is generated for the start procedure, which is not stored in a legible form in the safety module. All other check digits can be stored in a freely accessible and readable manner on the system carrier, since the secret key is not accessible for the encryption steps. The security module of the target computer works in such a way that the key stored in it is only used to calculate a check digit while simultaneously comparing this check digit with a reference check digit supplied to the security module, so that the security module cannot output a check digit as a result, but only a yes No statement about whether the calculated check digit matches the reference check digit or not, ie in the target computer system, without knowledge of the secret key, no unauthorized PZ check digit calculation is possible.
Nachdem im Verwaltungsrechner in beschriebener Weise ein Systemträger mit den zusätzlichen Informationen versehen wurde, kann dieser Systemträger im Zielrechner eingesetzt werden. Bei Inbetriebnahme des Zielrechnersystems wird die Integritätskontrolle automatisch innerhalb der zeitlich vor dem Anwendungsbetrieb laufenden Systemanlaufprozedur veranlaßt. Dabei ergeben sich mehrere Prüfschritte, wobei ein jeweiliger Prüfschritt nur dann veranlaßt wird, wenn sein Ausführungscode durch den vorhergehenden Prüfschritt als unverändert nachgewiesen wurde.After the system carrier has been provided with the additional information in the management computer in the manner described, this system carrier can be used in the target computer will. When the target computer system is started up, the integrity check is automatically initiated within the system start-up procedure that is running before the application is started. This results in several test steps, whereby a respective test step is only initiated if its execution code has been verified as unchanged by the previous test step.
Der erste Prüfschritt wird von dem Urladerprogramm veranlaßt und in dem Sicherheitsbaustein durchgeführt. Somit ist diese Logik physikalisch nicht frei zugänglich. Wird das Urladerprogramm logisch beeinflußt bzw. verändert, so wird bereits bei dem ersten Prüfschritt innerhalb des Sicherheitsbausteins eine solche Veränderung festgestellt und der Sicherheitsbaustein deaktiviert, so daß er für die nachfolgenden Prüfschritte nicht mehr benutzt werden kann und diese somit nicht mehr durchführbar sind.The first test step is initiated by the bootstrap program and carried out in the safety module. This logic is therefore not physically freely accessible. If the bootstrap program is influenced or changed logically, such a change is detected during the first test step within the safety module and the safety module is deactivated so that it can no longer be used for the subsequent test steps and can therefore no longer be carried out.
In Fig. 1 ist dargestellt, wie in dem Verwaltungsrechner der Systemträger und der Sicherheitsbaustein eines Zielrechners dem erfindungsgemäßen Verfahren unterzogen werden. Auf der linken Seite der vertikalen gestrichelten Linie sind schematisch die im Rahmen des Sicherungsverfahrens aktiven Komponenten des Verwaltungsrechners dargestellt, während rechts die passiven Komponenten gezeigt sind, die für den Einsatz im Zielrechner vorbereitet werden müssen. Aktive Komponente'n sind ein Verschlüsselungsprogramm 11, mit dem die einzelnen, zur Berechnung von Prüfziffern durchzuführenden Verschlüsselungsschritte gesteuert werden, und ein Verschlüsselungsbaustein 12, dem gesteuert durch das Verschlüsselungsprogramm 11, die einzelnen zu sichernden Programme zugeführt werden, so daß er für jedes Programm eine Prüfziffer abgeben kann. Passive Komponenten sind ein Systemträger 15 mit einem Prüfziffernspeicher 14 und einem Klartextspeicherteil 13 für gesicherte Programme sowie ein Sicherheitsbaustein 16 und ein Klartextspeicher 17 für ein Urladerprogramm.1 shows how the system carrier and the security module of a target computer are subjected to the method according to the invention in the administration computer. On the left side of the vertical dashed line, the components of the management computer that are active as part of the backup procedure are shown schematically, while the passive components that have to be prepared for use in the target computer are shown on the right. Active components are an
Bei der Vorbereitung der passiven Komponenten für den Einsatz im Zielrechner wird zunächst das Urladerprogramm aus dem Klartextspeicher 17, gesteuert durch das Verschlüsselungsprogramm 11, ausgegeben und mit dem Verschlüsselungs baustein 12 unter Verwendung des in ihm vorhandenen geheimen Schlüssels die dem Urladerprogramm zuzuordnende Prüfziffer berechnet. Diese wird dann vom Verschlüsselungsbaustein 12 ausgegeben und, unter Steuerung durch das Verschlüsselungs programm 11, dem Sicherheitsbaustein 16 zugeführt; mit diesem Schritt wird dem Sicherheitsbaustein 16 gleichzeitig der geheime Schlüssel zur lesegeschützten Speicherung übergeben. Danach werden die Prüfziffern für die in dem Klartextspeicherteil 13 des Systemträgers 15 enthaltenen Programme berechnet und, gesteuert durch das Verschlüsselungsprogramm 11, in dem Prüfziffernspeicher 14 des Systemträgers 15 gespeichert. Sämtlichen Verschlüsselungsschritten die in dem Verschlüsselungsbaustein 12 des Verwaltungsrechners durchgeführt werden, liegt der geheime Schlüssel zugrunde, der in dem Verschlüsselungsbaustein 12 abgespeichert ist.When preparing the passive components for use in the target computer, the bootstrap program is first output from the
Fig. 2 zeigt, in welcher Weise ein wie beschrieben vorbereiteter Systemträger und Sicherheitsbaustein in einem Zielrechner allgemein zur Integritätskontrolle von Programmen eingesetzt werden. Es ist ein Prüfschritt als Teil einer Kette von Prüfschritten dargestellt, die innerhalb der Systemanlaufphase des Zielrechners liegen können. Auf der linken Seite einer vertikalen gestrichelten Linie sind aktive Komponenten, auf der rechten Seite passive Komponenten des Zielrechners dargestellt. Jeder Prüfschritt wird mit einem prüfenden Programm 21 durchgeführt, das als Prüfer bezeichnet ist und die Prüfobjekte, nämlich ein zu prüfendes Programm 23 und eine zugehörige Prüfziffer 24, enem Sicherheitsbaustein 22 zuführt, der in beschriebener Weise unter Verwendung des in ihn eingegebenen geheimen Schlüssels für jedes ihm zugeführte Programm eine Prüfziffer berechnet und diese mit der ihm zugeführten zugehörigen Prüfziffer 24 vergleicht. Das Vergleichsergebnis übergibt der Sicherheitsbaustein 22, gesteuert durch das prüfende Programm 21, in Form einer Ja-Nein-Aussage an die nächste prüfende Instanz, die das soeben geprüfte Programm ist, sofern es sich um eine Ja-Aussage handelt. Handelt es sich um eine Nein-Aussage, so wird ein besonderer Funktionsblock aktiviert, der die Fehlersituation signalisieren kann und beispielsweise den Ablauf des Systems unterbricht, eine Fehlermeldung veranlaßt oder anderweitig einen Korrektureingriff erzwingt.2 shows the manner in which a system carrier and security module prepared as described are generally used in a target computer for checking the integrity of programs. A test step is shown as part of a chain of test steps that can lie within the system start-up phase of the target computer. Active components are shown on the left side of a vertical dashed line, passive components of the target computer are shown on the right side. Each test step is carried out with a
Der gesamte vorstehend beschriebene Vorgang wird veranlaßt durch ein dem prüfenden Programm 21 zugeführtes Startsignal, das die Ja-Aussage des vorhergehenden Prüfschritts oder aber das anfängliche Startsignal für den Systemstart sein kann.The entire process described above is initiated by a start signal which is supplied to the
Fig. 3 zeigt, wie eine Folge von Prüfschritten vorstehend erläuterter Art in einem Zielrechner durchgeführt werden kann. Es handelt sich um eine Darstellung des zeitlichen Ablaufs dieser Prüfschritte, die von oben nach unten in drei Phasen unterteilt ist, nämlich eine Einschaltphase, eine Systemanlaufphase und eine Anwendungsphase. Dabei sind wie in den Fig. 1 und 2 die aktiven Komponenten links, die passiven Komponenten rechts von einer vertikalen gestrichelten Linie dargestellt. Die einzelnen Prüfschritte sind fortlaufend mit S0, S1, S2, S3 ... Sn bezeichnet. Bei jedem Prüfschritt S1 bis Sn ist als aktive Komponente ein prüfendes Programm und als passive Komponente ein zu prüfendes Programm dargestellt. Dabei ist der Sicherheitsbaustein für den jeweiligen Prüfschritt nicht gezeigt, da seine Funkton bereits an Hand der Fig. 2 erläutert wurde.3 shows how a sequence of test steps of the type explained above can be carried out in a target computer. It is a representation of the chronological sequence of these test steps, which is divided into three phases from top to bottom, namely a switch-on phase, a system start-up phase and an application phase. As in FIGS. 1 and 2, the active components are shown on the left, the passive components on the right by a vertical dashed line. The individual test steps are continuously labeled S0, S1, S2, S3 ... Sn. In each test step S1 to Sn, a test program is shown as the active component and a program to be tested as the passive component. Here is the safety module not shown for the respective test step, since its function has already been explained with reference to FIG. 2.
Mit Einschalten des Zielrechners wird im Prüfschritt S0 ein Startsignal ST an das Urladerprogramm 31 gegeben, das dadurch gestartet wird und den Prüfschritt S1 veranlaßt, der damit erster Schritt der Systemanlaufphase ist. Bei dem Prüfschritt S1 wird das Urladerprogramm 31 als zu prüfendes Programm dem Sicherheitsbaustein 35 zugeführt und in diesem unter Anwendung des in ihm gespeicherten geheimen Schlüssels eine Verschlüsselung zur Berechnung einer Prüfziffer durchgeführt, die dann mit der in ihm gespeicherten Prüfziffer für das Urladerprogramm 31 verglichen wird. Bei Übereinstimmung beider Prüfziffern ergibt sich eine Ja-Aussage, mit der das Urladerprogramm 31 für den Prüfschritt S2 angesteuert wird, so daß es für diesen Prüfschritt zur aktiven Komponente wird, mit der das residente Betriebssystem 32 geprüft wird. Eine vom Sicherheitsbaustein 35 abgegebene Nein-Aussage wird einem Steuerprogramm 36 zugeführt, das den weiteren Systemanlauf in hier nicht dargestellter Weise unterbrechen kann.When the target computer is switched on, a start signal ST is given to the
Das residente Betriebssystem 32 wird als passive Komponen te mit seinen einzelnen Programmteilen durch das Urladerprogramm 31 an den für diesen Prüfschritt S2 nicht gezeigten Sicherheitsbaustein übergeben, so daß es dort einer Verschlüsselung unterzogen werden kann, durch die sich eine Prüfziffer ergibt. Diese Prüfziffer wird mit einer Prüfziffer 34 verglichen, die gleichzeitig dem Urladerprogramm 31 bzw. dem damit irn Verbindung stehenden Sicherheitsbaustein zugeführt wird. Bei Gleichheit beider Prüfziffern ergibt sich eine Ja-Aussage, die das residente Betriebssystem 32 ansteuert und dieses zur aktiven Komponente macht, die dann die Prüfung von Programmteilen aus der Ladebibliothek 33 veranlaßt. Dieser Prüfschritt S3 wird wie der Prüfschritt S2 durchgeführt, so daß sich bei Übereinstimmung der in ihm errechneten Prüfziffer mit der dem jeweils zu prüfenden Programm zugehörigen Prüfziffer 34 eine Ja-Aussage ergibt, die an das Steuerprogramm 36 weitergegeben wird, welches dann den Betrieb der Anwendungsphase durch ein Signal AW starten kann.The
Innerhalb der Anwendungsphase können selbstverständlich weitere Prüfschritte der hier beschriebenen Art durchgeführt werden, sofern die einzelnen Anwendungsprogramme im Verwaltungsrechner mit einer Prüfziffer versehen wurden, die in einem Prüfziffernspeicher oder auch in der Ladebibliothek gespeichert sein kann.Further test steps of the type described here can of course be carried out within the application phase, provided that the individual application programs have been provided with a check digit in the administration computer, which can be stored in a check digit memory or in the loading library.
In Fig. 4 ist in Blockdarstellung die Erzeugung einer Prüfziffer mit einem Verschlüsselungsbaustein im Verwaltungsrechner dargestellt. Ein zu prüfendes Programm oder Prüfobjekt P0, für das eine Prüfziffer PZ(P0) zu berechnen ist, wird unter Angabe einer Adresse ADR und einer Länge LAE einem Teilungsprogramm zugeführt, um das Prüfobjekt in einzelne Blöcke B aufzuteilen. Diese Blöcke B haben untereinander gleiche Länge und werden jeweils mindestens einmal einem DES-Verschlüsselungsschritt mit geheimem Startwert SW und Schlüssel IK unterzogen. Dazu dient ein Verschlüsselungsprogramm 41. Das bei der Verschlüsselung eines jeweiligen Blocks B eintretende Ergebnis C wird dem Verschlüsselungsprogramm 41 als Startwert für den nächsten zu verschlüsselnden Block zugeführt. Das Verschlüsselungsergebnis des letzten Blocks B ist mit CE bezeichnet und stellt die erzeugte Prüfziffer PZ(P0) dar, die dann einem Programm zugeordnet oder aber in einem Sicherheitsbaustein als Prüfziffer für ein Urladerprogramm gespeichert werden kann.4 shows the generation of a check digit with an encryption module in the management computer in a block diagram. A program or test object P0 to be tested, for which a check digit PZ (P0) is to be calculated, is supplied to a division program, specifying an address ADR and a length LAE, in order to divide the test object into individual blocks B. These blocks B have the same length and are each subjected to a DES encryption step with a secret starting value SW and key IK at least once. An
Es ist darauf hinzuweisen, daß dieses Erzeugen einer Prüfziffer mit Firmware oder mit Software ausgeführt werden kann.It should be noted that this generation of a check digit can be carried out with firmware or with software.
Fig. 5 zeigt die Durchführung einer Prüfziffernkontrolle im Zielrechner mit einem Sicherheitsbaustein. Die Prüfziffernkontrolle unterscheidet sich von der an Hand der Fig. 4 beschriebenen Erzeugung lediglich durch die Ein-/Ausgabeparameter und durch einen Vergleichsvorgang. Zusätzlicher Eingabeparameter ist ein Referenzwert RW, der nach der Berechnung der Prüfziffer PZ(P0) als Vergleichswert dient. Das Vergleichsergebnis steuert als Ja-NeinAussage in bereits beschriebener Weise weitere Prüfschritte oder ein Steuerprogramm an.5 shows the execution of a check digit check in the target computer with a security module. The check digit control differs from the generation described with reference to FIG. 4 only in the input / output parameters and in a comparison process. An additional input parameter is a reference value RW, which serves as a comparison value after the calculation of the check digit PZ (P0). As a yes-no statement, the comparison result drives further test steps or a control program in the manner already described.
Das Verfahren der Prüfziffernkontrolle erfordert für die in Fig. 4 gezeigte Verschlüsselung und die in Fig. 5 gezeigte Prüfziffernkontrolle übereinstimmende Verschlüsselungsverfahren, Startwerte und Schlüssel.For the encryption shown in FIG. 4 and the check digit control shown in FIG. 5, the method of check digit control requires corresponding encryption methods, start values and keys.
Fig. 6 zeigt den prinzipiellen Aufbau eines Sicherheitsbausteins 60 als Ausführungsbeispiel. Es kann sich dabei um einen Hardwaremodul handeln, der über eine Steckverbindung mit dem Zielrechner verbunden sein kann. Über diese Verbindung werden Befehle und Daten zwischen Zielrechner und Sicherheitsbaustein ausgetauscht. Wesentliche Bestandteile des Sicherheitsbausteins sind ein Prozessor 61 und ein Sicherheits-Hybridmodul 62. Der Prozessor 61 dient der Steuerung der einzelnen Funktionen des Sicherheitsbausteins 60, beispielsweise zur Befehlsdecodierung, zum Durchschalten von Datenleitungen und zur Auftragsvergabe an den Sicherheits-Hybridmodul 62. Dieser ist ein Baustein nach Art eines integrierten Schaltkreises, dessen modulare Bestandteile aber diskret aufgebracht sind und insgesamt mit einer Keramikabdeckung versehen sein können. Der Hybridmodul enthält einen Prozessor 63, einen DES-Baustein 64 sowie zwei Schlüsselspeicher 65 und 66 mit wahlfreiem Zugriff. Der Prozessor 63 dient der Steuerung und Ausführung von Befehlen und Daten zwischen dem DES-Baustein 64 und den lesegeschützten Schlüsselspeichern 65 und 66. Ferner steuert er den externen Datenfluß zum Prozessor 61. Der DES-Baustein 64 steuert die Ausführung des beschriebenen Verschlüsselungsverfahrens. Der Schlüsselspeicher 65 dient zur Aufnahme von Schlüsseln mit einer Länge von z.B. 64 Bit, die der Anwendung zur DES-Verschlüsselung zur Verfügung stehen; der Schlüsselspeicher 66 enthält Schlüssel, die nur vom Prozessor 63 für interne Funktionen benützt werden können, nicht aber durch externe Anwendungsprogramme. Ein Zugriff auf eine Datenleitung innerhalb des SicherheitsHybridmoduls wird durch die genannte keramische Abdeckung verhindert. Sollte die Verbindung des Sicherheitsbausteins 60 zum Zielrechner unterbrochen werden, so wird dadurch der Schlüsselspeicher 65 gelöscht. Der Inhalt des Schlüsselspeichers 66 kann durch eine Batterie gehalten werden. Sollte der Hybridmodul 62 aus dem Sicherheitsbaustein 60 entfernt werden, so bedeutet dies den Verlust aller gespeicherten Werte. Damit ist gewährleistet, daß eine Nutzung des Sicherheitsbausteins 60 außerhalb des Rechnerbereichs nicht möglich ist.6 shows the basic structure of a
Claims (4)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AT88100810T ATE103402T1 (en) | 1987-02-23 | 1988-01-20 | PROCEDURES FOR BACKING UP PROGRAMS AND INTEGRITY CONTROL OF BACKED UP PROGRAMS. |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE19873705736 DE3705736A1 (en) | 1987-02-23 | 1987-02-23 | METHOD FOR SECURING PROGRAMS AND PROGRAMS SAVED FOR INTEGRITY |
DE3705736 | 1987-02-23 |
Publications (3)
Publication Number | Publication Date |
---|---|
EP0280035A2 true EP0280035A2 (en) | 1988-08-31 |
EP0280035A3 EP0280035A3 (en) | 1990-05-16 |
EP0280035B1 EP0280035B1 (en) | 1994-03-23 |
Family
ID=6321565
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP88100810A Expired - Lifetime EP0280035B1 (en) | 1987-02-23 | 1988-01-20 | Method for the programme securing and for integrity checking of a secured programme |
Country Status (5)
Country | Link |
---|---|
EP (1) | EP0280035B1 (en) |
JP (1) | JP2564593B2 (en) |
AT (1) | ATE103402T1 (en) |
DE (2) | DE3705736A1 (en) |
ES (1) | ES2050671T3 (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0400233A1 (en) * | 1984-10-29 | 1990-12-05 | Michael H. Francisco | Method for maintaining data processing system security |
FR2647924A1 (en) * | 1989-06-06 | 1990-12-07 | Bull Cp8 | METHOD FOR VERIFYING INTEGRITY OF SOFTWARE OR DATA, AND SYSTEM FOR IMPLEMENTING SAID METHOD |
WO1993023807A1 (en) * | 1992-05-14 | 1993-11-25 | Gruno, Gerhard | Program protection method for protecting data processing equipment |
DE4339075A1 (en) * | 1993-11-16 | 1995-05-18 | Dallmeier Dieter | Generating digital image from monitoring system |
EP0772125A1 (en) * | 1995-10-26 | 1997-05-07 | MAN Roland Druckmaschinen AG | System start-up for a computer controlling a printing machine |
EP0962850A2 (en) * | 1998-06-01 | 1999-12-08 | Nokia Mobile Phones Ltd. | A method for protecting embedded system software and embedded system |
WO2003040929A1 (en) * | 2001-11-09 | 2003-05-15 | Wenhu Wang | A method of the information secure |
EP1115094A3 (en) * | 2000-01-08 | 2004-03-03 | Philips Intellectual Property & Standards GmbH | Data processing device and its method of operation |
WO2004107283A1 (en) * | 2003-05-23 | 2004-12-09 | Nagracard Sa | Security key generation method |
CN114764347A (en) * | 2022-04-14 | 2022-07-19 | 重庆长安汽车股份有限公司 | Program verification system and method of multi-core controller and storage medium |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE4234165C1 (en) * | 1992-10-09 | 1994-03-03 | Detecon Gmbh | Procedure to enable the subsequent review of data already transmitted |
US5598470A (en) * | 1994-04-25 | 1997-01-28 | International Business Machines Corporation | Method and apparatus for enabling trial period use of software products: Method and apparatus for utilizing a decryption block |
US20050223241A1 (en) * | 2002-06-14 | 2005-10-06 | Matsushita Electric Industrial Co. Ltd | Semiconductor intergrated circuit device, data storage verification device, and data storage verification method |
DE102006057297A1 (en) * | 2006-12-05 | 2008-06-12 | Giesecke & Devrient Gmbh | Method for monitoring of progress of program, involves processing test value of command sequence of program, which is calculated on basis of commands during execution of program |
JP5159849B2 (en) | 2010-09-24 | 2013-03-13 | 株式会社東芝 | Memory management device and memory management method |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE2650795A1 (en) * | 1976-11-03 | 1978-05-11 | Licentia Gmbh | Computer storage contents monitoring - comparing words derived from assembler code and data to determine if stored data set has varied |
EP0135888A2 (en) * | 1983-09-29 | 1985-04-03 | Siemens Aktiengesellschaft | Process for preventing the execution of a programme in a computer which is not allowed to execute said programme |
US4593353A (en) * | 1981-10-26 | 1986-06-03 | Telecommunications Associates, Inc. | Software protection method and apparatus |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS6054046A (en) * | 1983-09-05 | 1985-03-28 | Mitsubishi Electric Corp | Software protecting method |
-
1987
- 1987-02-23 DE DE19873705736 patent/DE3705736A1/en active Granted
-
1988
- 1988-01-20 DE DE88100810T patent/DE3888556D1/en not_active Expired - Fee Related
- 1988-01-20 AT AT88100810T patent/ATE103402T1/en not_active IP Right Cessation
- 1988-01-20 ES ES88100810T patent/ES2050671T3/en not_active Expired - Lifetime
- 1988-01-20 EP EP88100810A patent/EP0280035B1/en not_active Expired - Lifetime
- 1988-02-23 JP JP63040545A patent/JP2564593B2/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE2650795A1 (en) * | 1976-11-03 | 1978-05-11 | Licentia Gmbh | Computer storage contents monitoring - comparing words derived from assembler code and data to determine if stored data set has varied |
US4593353A (en) * | 1981-10-26 | 1986-06-03 | Telecommunications Associates, Inc. | Software protection method and apparatus |
EP0135888A2 (en) * | 1983-09-29 | 1985-04-03 | Siemens Aktiengesellschaft | Process for preventing the execution of a programme in a computer which is not allowed to execute said programme |
Non-Patent Citations (1)
Title |
---|
ELECTRONICS, Band 52, Nr. 13, Juni 1979, Seiten 107-120; H.J. HINDIN: "LSI-based data encryption discourages the data thief" * |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0400233A1 (en) * | 1984-10-29 | 1990-12-05 | Michael H. Francisco | Method for maintaining data processing system security |
FR2647924A1 (en) * | 1989-06-06 | 1990-12-07 | Bull Cp8 | METHOD FOR VERIFYING INTEGRITY OF SOFTWARE OR DATA, AND SYSTEM FOR IMPLEMENTING SAID METHOD |
EP0402210A1 (en) * | 1989-06-06 | 1990-12-12 | Bull Cp8 | Method for verifying the integrity of software or data and system for implementing this method |
WO1990015384A1 (en) * | 1989-06-06 | 1990-12-13 | Bull Cp8 | Method of checking the integrity of software or data, and system for implementing said method |
JPH0727497B2 (en) * | 1989-06-06 | 1995-03-29 | ブル・セー・ペー・8 | Method and mobile device for checking message integrity |
WO1993023807A1 (en) * | 1992-05-14 | 1993-11-25 | Gruno, Gerhard | Program protection method for protecting data processing equipment |
DE4339075A1 (en) * | 1993-11-16 | 1995-05-18 | Dallmeier Dieter | Generating digital image from monitoring system |
EP0772125A1 (en) * | 1995-10-26 | 1997-05-07 | MAN Roland Druckmaschinen AG | System start-up for a computer controlling a printing machine |
EP0962850A2 (en) * | 1998-06-01 | 1999-12-08 | Nokia Mobile Phones Ltd. | A method for protecting embedded system software and embedded system |
EP0962850A3 (en) * | 1998-06-01 | 2003-01-29 | Nokia Corporation | A method for protecting embedded system software and embedded system |
EP1115094A3 (en) * | 2000-01-08 | 2004-03-03 | Philips Intellectual Property & Standards GmbH | Data processing device and its method of operation |
WO2003040929A1 (en) * | 2001-11-09 | 2003-05-15 | Wenhu Wang | A method of the information secure |
WO2004107283A1 (en) * | 2003-05-23 | 2004-12-09 | Nagracard Sa | Security key generation method |
CN114764347A (en) * | 2022-04-14 | 2022-07-19 | 重庆长安汽车股份有限公司 | Program verification system and method of multi-core controller and storage medium |
Also Published As
Publication number | Publication date |
---|---|
DE3705736C2 (en) | 1988-12-01 |
ATE103402T1 (en) | 1994-04-15 |
EP0280035B1 (en) | 1994-03-23 |
ES2050671T3 (en) | 1994-06-01 |
JPS63240629A (en) | 1988-10-06 |
EP0280035A3 (en) | 1990-05-16 |
DE3888556D1 (en) | 1994-04-28 |
DE3705736A1 (en) | 1988-09-01 |
JP2564593B2 (en) | 1996-12-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DE69729557T2 (en) | METHOD AND APPARATUS FOR SOFTWARE ACCESS TO A MICROPROCESSOR SERIAL NUMBER | |
DE69527773T2 (en) | Circuit arrangement for monitoring the use of functions in an integrated circuit | |
DE69534757T2 (en) | System and method for secure storage and distribution of data using digital signatures | |
EP0280035B1 (en) | Method for the programme securing and for integrity checking of a secured programme | |
DE102008006759B4 (en) | Processor assembly and method of operating the processor assembly without reducing overall security | |
DE10162306A1 (en) | Method and arrangement for verifying NV fuses as well as a corresponding computer program product and a corresponding computer-readable storage medium | |
EP2272199B1 (en) | Distributed data memory unit | |
DE3321910A1 (en) | DEVICE AND METHOD FOR PROTECTING SOFTWARE | |
DE102016210788B4 (en) | Component for processing data worthy of protection and method for implementing a security function for protecting data worthy of protection in such a component | |
EP3811260B1 (en) | Cryptography module and method for operating same | |
EP1661069B1 (en) | Processor circuit and method for allocating a logic chip to a memory chip | |
DE10156877B4 (en) | Method and system for secure storage and readout of user data | |
EP0813723A1 (en) | Chip card with protected operating system | |
DE102020207862A1 (en) | Procedure for the secure update of control units | |
EP1912184A2 (en) | Data generating device and method | |
EP1150190A2 (en) | Apparatus and method for controlling and/or regulating of a technical installation | |
EP3407242A1 (en) | Personalisation of a semiconductor element | |
DE10164419A1 (en) | Method and arrangement for protecting digital circuit parts | |
DE102019130067B4 (en) | Method for carrying out permission-dependent communication between at least one field device in automation technology and an operating device | |
DE102012110510A1 (en) | A method for the secure storage of event log data of a computer system, computer program product and computer system | |
DE102023102691A1 (en) | Method for writing data to an IC and system for carrying out the method | |
DE4423565C1 (en) | Crypto circuit | |
AT526879A1 (en) | Method for writing data to an IC and system for carrying out the method | |
DE102015119140A1 (en) | Method for controlling access to encrypted files and computer system | |
EP1460510B1 (en) | Method for secure communication between data processing equipment and a security device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
AK | Designated contracting states |
Kind code of ref document: A2 Designated state(s): AT BE CH DE ES FR GB GR IT LI LU NL SE |
|
PUAL | Search report despatched |
Free format text: ORIGINAL CODE: 0009013 |
|
AK | Designated contracting states |
Kind code of ref document: A3 Designated state(s): AT BE CH DE ES FR GB GR IT LI LU NL SE |
|
17P | Request for examination filed |
Effective date: 19900827 |
|
RAP3 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: SIEMENS NIXDORF INFORMATIONSSYSTEME AKTIENGESELLSC |
|
17Q | First examination report despatched |
Effective date: 19930707 |
|
GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): AT BE CH DE ES FR GB GR IT LI LU NL SE |
|
REF | Corresponds to: |
Ref document number: 103402 Country of ref document: AT Date of ref document: 19940415 Kind code of ref document: T |
|
REF | Corresponds to: |
Ref document number: 3888556 Country of ref document: DE Date of ref document: 19940428 |
|
REG | Reference to a national code |
Ref country code: ES Ref legal event code: FG2A Ref document number: 2050671 Country of ref document: ES Kind code of ref document: T3 |
|
ITF | It: translation for a ep patent filed | ||
GBT | Gb: translation of ep patent filed (gb section 77(6)(a)/1977) |
Effective date: 19940531 |
|
ET | Fr: translation filed | ||
REG | Reference to a national code |
Ref country code: GR Ref legal event code: FG4A Free format text: 3012051 |
|
PLBE | No opposition filed within time limit |
Free format text: ORIGINAL CODE: 0009261 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT |
|
EAL | Se: european patent in force in sweden |
Ref document number: 88100810.6 |
|
26N | No opposition filed | ||
REG | Reference to a national code |
Ref country code: CH Ref legal event code: PUE Owner name: SIEMENS NIXDORF INFORMATIONSSYSTEME AKTIENGESELLSC |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: NV Representative=s name: E. BLUM & CO. PATENTANWAELTE |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: TP |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: 732E |
|
BECA | Be: change of holder's address |
Free format text: 20010405 *FUJITSU SIEMENS COMPUTERS G.M.B.H.:OTTO-HAHN-RING 6, 81739 MUENCHEN |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: IF02 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: NL Payment date: 20020106 Year of fee payment: 16 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: FR Payment date: 20021231 Year of fee payment: 16 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: SE Payment date: 20030102 Year of fee payment: 16 Ref country code: AT Payment date: 20030102 Year of fee payment: 16 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: CH Payment date: 20030106 Year of fee payment: 16 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: LU Payment date: 20030115 Year of fee payment: 16 Ref country code: GB Payment date: 20030115 Year of fee payment: 16 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: GR Payment date: 20030130 Year of fee payment: 16 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: DE Payment date: 20030131 Year of fee payment: 16 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: BE Payment date: 20030206 Year of fee payment: 16 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: ES Payment date: 20030207 Year of fee payment: 16 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LU Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20040120 Ref country code: GB Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20040120 Ref country code: AT Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20040120 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20040121 Ref country code: ES Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20040121 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LI Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20040131 Ref country code: CH Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20040131 Ref country code: BE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20040131 |
|
BERE | Be: lapsed |
Owner name: *FUJITSU SIEMENS COMPUTERS G.M.B.H. Effective date: 20040131 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: NL Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20040801 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: DE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20040803 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: GR Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20040804 |
|
EUG | Se: european patent has lapsed | ||
GBPC | Gb: european patent ceased through non-payment of renewal fee |
Effective date: 20040120 |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: PL |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: FR Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20040930 |
|
NLV4 | Nl: lapsed or anulled due to non-payment of the annual fee |
Effective date: 20040801 |
|
REG | Reference to a national code |
Ref country code: FR Ref legal event code: ST |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IT Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES;WARNING: LAPSES OF ITALIAN PATENTS WITH EFFECTIVE DATE BEFORE 2007 MAY HAVE OCCURRED AT ANY TIME BEFORE 2007. THE CORRECT EFFECTIVE DATE MAY BE DIFFERENT FROM THE ONE RECORDED. Effective date: 20050120 |
|
REG | Reference to a national code |
Ref country code: ES Ref legal event code: FD2A Effective date: 20040121 |